Researchers at multinational cybersecurity firm, Kaspersky Labs, found a malicious module within the extensively used cell scanning app, CamScanner. On account of the invention, the app was taken down by Google from its play retailer final week. Seemingly, the iOS model of the app remained unaffected by the malware.
On fifth September 2019, the builders of the favored PDF creator app, introduced the app’s comeback on their official Twitter deal with. Reportedly, they’ve eliminated all promoting SDKs within the newest model of CamScanner, i.e., model 5.12.5, which might be downloaded by the customers from Google Play Retailer.
There have been points within the earlier model of the app, nevertheless, the app, CamScanner in itself is a totally genuine and extensively used software.
Based on the researchers at Kaspersky Labs, “Latest variations of the app shipped with an promoting library containing a malicious module,”
“The module is a Trojan-Dropper meaning the module extracts and runs one other malicious module from an encrypted file included within the app’s assets. This “dropped” malware, in flip, is a Trojan-Downloader that downloads extra malicious modules relying on what its creators are as much as in the intervening time,” they added.
The Trojan-Dropper module which known as as “Trojan-Dropper.AndroidOS.Necro.n” is configured to befool customers into signing up for paid subscriptions by displaying them intrusive ads.